scholarly journals Security Engineering towards Building a Secure Software

2013 ◽  
Vol 81 (6) ◽  
pp. 32-37 ◽  
Author(s):  
Mohammad NazmulAlam ◽  
Subhra Prosun Paul ◽  
Shahrin Chowdhury
2018 ◽  
pp. 551-592
Author(s):  
Holger Schmidt ◽  
Denis Hatebur ◽  
Maritta Heisel

This chapter presents a security engineering process based on UML security problem frames and concretized UML security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. The authors describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Then, solution approaches are specified by generic security components and generic security architectures, which constitute architectural patterns. Finally, the generic security components and the generic security architecture that composes them are refined, and the result is a secure software product built from existing and/or tailor-made security components.


Author(s):  
H. Mouratidis ◽  
P. Giorgini

This chapter serves as an introduction to this book. It introduces software engineering, security engineering, and secure software engineering, providing de?nitions and explanation of terms necessary for readers to understand the subsequent chapters. Characteristics of each of the above areas are presented followed by an overview of the current advances in these areas. Finally, the 10 approaches described in the remaining chapters of the book are brie?y introduced.


2015 ◽  
pp. 228-264
Author(s):  
Holger Schmidt ◽  
Denis Hatebur ◽  
Maritta Heisel

This chapter presents a security engineering process based on UML security problem frames and concretized UML security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. The authors describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Then, solution approaches are specified by generic security components and generic security architectures, which constitute architectural patterns. Finally, the generic security components and the generic security architecture that composes them are refined, and the result is a secure software product built from existing and/or tailor-made security components.


Author(s):  
H. Mouratidis ◽  
P. Giorgini

This chapter serves as an introduction to this book. It introduces software engineer-ing, security engineering, and secure software engineering, providing de?nitions and explanation of terms necessary for readers to understand the subsequent chapters. Characteristics of each of the above areas are presented followed by an overview of the current advances in these areas. Finally, the 10 approaches described in the remaining chapters of the book are brie?y introduced.


Author(s):  
Holger Schmidt ◽  
Denis Hatebur ◽  
Maritta Heisel

This chapter presents a security engineering process based on UML security problem frames and concretized UML security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. The authors describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Then, solution approaches are specified by generic security components and generic security architectures, which constitute architectural patterns. Finally, the generic security components and the generic security architecture that composes them are refined, and the result is a secure software product built from existing and/or tailor-made security components.


Author(s):  
Holger Schmidt ◽  
Denis Hatebur ◽  
Maritta Heisel

This chapter presents a security engineering process based on UML security problem frames and concretized UML security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. The authors describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Then, solution approaches are specified by generic security components and generic security architectures, which constitute architectural patterns. Finally, the generic security components and the generic security architecture that composes them are refined, and the result is a secure software product built from existing and/or tailor-made security components.


2002 ◽  
Author(s):  
David Rosenthal ◽  
Francis Fung ◽  
Stephen Garland ◽  
Andrew Myers ◽  
David Evans

Sign in / Sign up

Export Citation Format

Share Document